Advances in Mathematical Cryptography and Information Security toward Industry 5.0

A special issue of Mathematics (ISSN 2227-7390). This special issue belongs to the section "Engineering Mathematics".

Deadline for manuscript submissions: 1 December 2024 | Viewed by 8107

Special Issue Editors


E-Mail Website
Guest Editor
School of Engineering, University of Mount Union, Alliance, OH 44601-3993, USA
Interests: ML/federated learning in wireless systems; heterogeneous networks; massive MIMO; reconfigurable intelligent surface-assisted networks; mmWave communication networks; energy harvesting; full-duplex communications; cognitive radio; small cell; non-orthogonal multiple access (NOMA); physical layer security; UAV networks; visible light communication; IoT system
Special Issues, Collections and Topics in MDPI journals

Special Issue Information

Dear Colleagues,

As we gradually move toward Industry 5.0, which is envisioned as a complex network integrating information technology and massive industrial production processes, the need to protect security-critical systems from unauthorized access becomes imperative. However, due to the proliferation of massive devices in such a complex system, designing a secure user authentication scheme for achieving the desired forward secrecy poses several challenges. The preliminary authentication schemes have not addressed the problem by considering the resource-limited sensor nodes. Most of these schemes have not provided forward secrecy, and only a few achieve forward secrecy at high computational costs. Generally, the sensor nodes deployed in a typical industrial setting are resource-limited devices. In particular, their storage and computation resources are limited. Additionally, sensitive user data in the industry 5.0 applications need to be well secured from a multitude of sophisticated adversaries that proliferate cyber-space. As a result, it becomes expedient to authenticate and secure sensitive user information transmitted via sensor nodes from all intruders. In order to achieve this objective, a suitable authentication protocol and a session key are desirable to grant access to only the authorized users of the application. Cryptography relies on mathematics and logic to design strong security schemes. Modern cryptography and information security emphasize the mathematics behind the theory of these cryptosystems. This Special Issue calls for original contributions to designing and developing advanced mathematical cryptographic schemes for information security toward Industry 5.0.

The topics of interest include but are not limited to the following:

  • Advanced mathematical cryptography in the Industry 5.0 era.
  • Information security in Industry 5.0 for societal good.
  • Sustainable cryptographic models for secured systems in Industry 5.0.
  • Secured digital twins enabling smart systems in Industry 5.0.
  • Novel security architectures for smart systems in Industry 5.0.
  • Lightweight authentication schemes based on extended Chebyshev chaotic maps.
  • Machine learning aiding the design and development of advanced cryptographic schemes for information security.
  • Security and privacy challenges for designing and developing advanced cryptographic schemes for information security toward Industry 5.0.
  • Experimentation and deployment of advanced cryptographic schemes for information security.
  • Machine learning and blockchain technology enabling the design of novel advanced cryptographic schemes and information security.
  • Case studies and recommendations for designing and developing advanced cryptographic schemes for information security.

This Special Issue will provide novel contributions that will drive cutting-edge research, leading to the development of advanced mathematical cryptography and information security toward Industry 5.0. Quality submissions from academia and industry are highly welcome.

Prof. Dr. Cheng-Chi Lee
Dr. Dinh-Thuan Do
Guest Editors

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Mathematics is an international peer-reviewed open access semimonthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 2600 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • cryptography
  • lightweight schemes
  • energy-efficient protocols
  • authentication
  • information security
  • forward secrecy
  • wireless sensor nodes
  • biometrics
  • machine learning
  • Internet of Things
  • blockchain technology
  • security and privacy
  • chaotic communications
  • network intrusion detection
  • artificial intelligence
  • wireless security systems
  • discrete logarithms
  • factorization algorithms
  • probability theory
  • collision algorithms
  • lattice-based cryptography
  • chaos-based cryptography

Benefits of Publishing in a Special Issue

  • Ease of navigation: Grouping papers by topic helps scholars navigate broad scope journals more efficiently.
  • Greater discoverability: Special Issues support the reach and impact of scientific research. Articles in Special Issues are more discoverable and cited more frequently.
  • Expansion of research network: Special Issues facilitate connections among authors, fostering scientific collaborations.
  • External promotion: Articles in Special Issues are often promoted through the journal's social media, increasing their visibility.
  • e-Book format: Special Issues with more than 10 articles can be published as dedicated e-books, ensuring wide and rapid dissemination.

Further information on MDPI's Special Issue polices can be found here.

Published Papers (7 papers)

Order results
Result details
Select all
Export citation of selected articles as:

Research

21 pages, 475 KiB  
Article
A Secure Authentication Scheme with Local Differential Privacy in Edge Intelligence-Enabled VANET
by Deokkyu Kwon, Seunghwan Son, Kisung Park and Youngho Park
Mathematics 2024, 12(15), 2383; https://doi.org/10.3390/math12152383 - 31 Jul 2024
Viewed by 863
Abstract
Edge intelligence is a technology that integrates edge computing and artificial intelligence to achieve real-time and localized model generation. Thus, users can receive more precise and personalized services in vehicular ad hoc networks (VANETs) using edge intelligence. However, privacy and security challenges still [...] Read more.
Edge intelligence is a technology that integrates edge computing and artificial intelligence to achieve real-time and localized model generation. Thus, users can receive more precise and personalized services in vehicular ad hoc networks (VANETs) using edge intelligence. However, privacy and security challenges still exist, because sensitive data of the vehicle user is necessary for generating a high-accuracy AI model. In this paper, we propose an authentication scheme to preserve the privacy of user data in edge intelligence-enabled VANETs. The proposed scheme can establish a secure communication channel using fuzzy extractor, elliptic curve cryptography (ECC), and physical unclonable function (PUF) technology. The proposed data upload process can provide privacy of the data using local differential privacy and symmetric key encryption. We validate the security robustness of the proposed scheme using informal analysis, the Real-Or-Random (ROR) model, and the Scyther tool. Moreover, we evaluate the computation and communication efficiency of the proposed and related schemes using Multiprecision Integer and Rational Arithmetic Cryptographic Library (MIRACL) software development kit (SDK). We simulate the practical deployment of the proposed scheme using network simulator 3 (NS-3). Our results show that the proposed scheme has a performance improvement of 10∼48% compared to the state-of-the-art research. Thus, we can demonstrate that the proposed scheme provides comprehensive and secure communication for data management in edge intelligence-enabled VANET environments. Full article
Show Figures

Figure 1

19 pages, 9328 KiB  
Article
Covert Communication for Dual Images with Two-Tier Bits Flipping
by Shuying Xu, Jui-Chuan Liu, Ching-Chun Chang and Chin-Chen Chang
Mathematics 2024, 12(14), 2219; https://doi.org/10.3390/math12142219 - 16 Jul 2024
Viewed by 632
Abstract
Data hiding in digital images is a potent solution for covert communication, embedding sensitive data into cover images. However, most existing methods are tailored for one-to-one scenarios, which present security risks. To mitigate this vulnerability, we introduce an innovative one-to-two data hiding scheme [...] Read more.
Data hiding in digital images is a potent solution for covert communication, embedding sensitive data into cover images. However, most existing methods are tailored for one-to-one scenarios, which present security risks. To mitigate this vulnerability, we introduce an innovative one-to-two data hiding scheme that employs a two-tier bit-flipping strategy to embed sensitive data in dual images. This process produces two stego images which are then transmitted to two distinct recipients who cannot extract any sensitive data alone. The sensitive data can only be extracted when the two recipients trust each other. Through this method, we can secure the stego images. The experimental results illustrate that our method achieves an excellent data payload while maintaining high visual quality. Full article
Show Figures

Figure 1

23 pages, 729 KiB  
Article
Design of Secure and Privacy-Preserving Data Sharing Scheme Based on Key Aggregation and Private Set Intersection in Medical Information System
by Jihyeon Oh, Seunghwan Son, DeokKyu Kwon, Myeonghyun Kim, Yohan Park and Youngho Park
Mathematics 2024, 12(11), 1717; https://doi.org/10.3390/math12111717 - 31 May 2024
Cited by 2 | Viewed by 1268
Abstract
Medical data sharing is pivotal in enhancing accessibility and collaboration among healthcare providers, researchers, and institutions, ultimately leading to enhanced patient outcomes and more efficient healthcare delivery. However, due to the sensitive nature of medical information, ensuring both privacy and confidentiality is paramount. [...] Read more.
Medical data sharing is pivotal in enhancing accessibility and collaboration among healthcare providers, researchers, and institutions, ultimately leading to enhanced patient outcomes and more efficient healthcare delivery. However, due to the sensitive nature of medical information, ensuring both privacy and confidentiality is paramount. Access control-based data sharing methods have been explored to address these issues, but data privacy concerns still remain. Therefore, this paper proposes a secure and privacy-preserving data sharing scheme that achieves an equilibrium between data confidentiality and privacy. By leveraging key aggregate encryption and private set intersection techniques, our scheme ensures secure data sharing while protecting against the exposure of sensitive information related to data. We conduct informal and formal security analyses, including Burrow–Abadi–Needham logic and Scyther, to demonstrate its resilience against potential adversarial attacks. We also implement the execution time for cryptographic operations using multiprecision integer and a rational arithmetic cryptographic library and perform comparative analysis with existing related schemes in terms of security, computational cost, and time complexity. Our findings demonstrate a high level of security and efficiency, demonstrating that the proposed scheme contributes to the field by providing a solution that protects data privacy while enabling secure and flexible sharing of medical data. Full article
Show Figures

Figure 1

19 pages, 3128 KiB  
Article
Mathematical Model of the Process of Data Transmission over the Radio Channel of Cyber-Physical Systems
by Fazliddin Makhmudov, Andrey Privalov, Alexander Privalov, Elena Kazakevich, Gamzatdin Bekbaev, Alexey Boldinov, Kyung Hoon Kim and Young Im-Cho
Mathematics 2024, 12(10), 1452; https://doi.org/10.3390/math12101452 - 8 May 2024
Cited by 3 | Viewed by 922
Abstract
This article introduces a refined mathematical model to evaluate the quality of mobile radio channels within cyber-physical systems, employing the topological transformation of stochastic networks. The operation of the radio channel is conceptualized as a stochastic network, enabling the derivation of critical metrics [...] Read more.
This article introduces a refined mathematical model to evaluate the quality of mobile radio channels within cyber-physical systems, employing the topological transformation of stochastic networks. The operation of the radio channel is conceptualized as a stochastic network, enabling the derivation of critical metrics such as an equivalent function, mathematical expectation, variance, and the time distribution function of the implemented processes. The model uses the Gamma distribution for the initial distribution functions of random variables, enhancing its analytical precision. A significant advancement of this study is the development of a comprehensive model that describes the data transmission process through phases of connection establishment, information transmission, and connection maintenance. The innovative aspect of this research lies in applying an equivalent function to a stochastic network that includes a logical “AND” node with gamma-distributed incoming branches. The stochastic network presented in the article, which includes a logical “AND” node, helps to elucidate the mechanism for obtaining an equivalent function for such networks, allowing the application area of the GERT method to be expanded. This methodological enhancement extends the previously limited scope of topological transformation methods, which only applied to exponential distribution models for the timing of branch inputs. By integrating a Gamma distribution, the model simplifies the equivalent function and reduces the computational complexity required to assess the radio channel’s quality, ensuring the accuracy needed for engineering calculations. Moreover, the proposed method requires 25–40% fewer series members than the traditional Taylor series decomposition, while maintaining comparable computational complexity for the typical series members. Furthermore, the maximum absolute error in the calculations is capped at 9 × 10−3, which is well within acceptable limits for engineering purposes. Primarily designed for radio channels in cyber-physical systems, the model’s applicability extends to wireless communications, providing a valuable tool for evaluating channel efficiency and security in the face of increasing cyber threats. Full article
Show Figures

Figure 1

22 pages, 885 KiB  
Article
A Reliable and Privacy-Preserving Vehicular Energy Trading Scheme Using Decentralized Identifiers
by Myeonghyun Kim, Kisung Park and Youngho Park
Mathematics 2024, 12(10), 1450; https://doi.org/10.3390/math12101450 - 8 May 2024
Cited by 3 | Viewed by 918
Abstract
As the usage of electric vehicles (EVs) expands, various energy management technologies, including battery energy storage systems, are being developed to efficiently charge EVs using various energy sources. In recent years, many blockchain-based energy trading schemes have been proposed for secure energy trading. [...] Read more.
As the usage of electric vehicles (EVs) expands, various energy management technologies, including battery energy storage systems, are being developed to efficiently charge EVs using various energy sources. In recent years, many blockchain-based energy trading schemes have been proposed for secure energy trading. However, existing schemes cannot fully solve privacy issues and security problems during energy trading. In this paper, we propose a reliable and privacy-preserving vehicular energy trading scheme utilizing decentralized identifier technology. In the proposed scheme, identity information and trading result information are not revealed publicly; this is due to the use of decentralized identifiers and verifiable credential technologies. Additionally, only parties who have successfully conducted energy trading can manage complete transaction information. We also demonstrate our method’s security and ensure privacy preservation by performing informal and formal security analyses. Furthermore, we analyze the performance and security features of the proposed scheme and related works and show that the proposed scheme has competitive performance. Full article
Show Figures

Figure 1

15 pages, 5983 KiB  
Article
Embedding Secret Data in a Vector Quantization Codebook Using a Novel Thresholding Scheme
by Yijie Lin, Jui-Chuan Liu, Ching-Chun Chang and Chin-Chen Chang
Mathematics 2024, 12(9), 1332; https://doi.org/10.3390/math12091332 - 27 Apr 2024
Cited by 1 | Viewed by 1036
Abstract
In recent decades, information security has become increasingly valued, including many aspects of privacy protection, copyright protection, and digital forensics. Therefore, many data hiding schemes have been proposed and applied to various carriers such as text, images, audio, and videos. Vector Quantization (VQ) [...] Read more.
In recent decades, information security has become increasingly valued, including many aspects of privacy protection, copyright protection, and digital forensics. Therefore, many data hiding schemes have been proposed and applied to various carriers such as text, images, audio, and videos. Vector Quantization (VQ) compression is a well-known method for compressing images. In previous research, most methods related to VQ compressed images have focused on hiding information in index tables, while only a few of the latest studies have explored embedding data in codebooks. We propose a data hiding scheme for VQ codebooks. With our approach, a sender XORs most of the pixel values in a codebook and then applies a threshold to control data embedding. The auxiliary information generated during this process is embedded alongside secret data in the index reordering phase. Upon receiving the stego codebook and the reordered index table, the recipient can extract the data and reconstruct the VQ-compressed image using the reverse process. Experimental results demonstrate that our scheme significantly improves embedding capacity compared to the most recent codebook-based methods. Specifically, we observe an improvement rate of 223.66% in a small codebook of size 64 and an improvement rate of 85.19% in a codebook of size 1024. Full article
Show Figures

Figure 1

14 pages, 300 KiB  
Article
On Efficient Parallel Secure Outsourcing of Modular Exponentiation to Cloud for IoT Applications
by Satyabrat Rath, Jothi Ramalingam and Cheng-Chi Lee
Mathematics 2024, 12(5), 713; https://doi.org/10.3390/math12050713 - 28 Feb 2024
Cited by 2 | Viewed by 739
Abstract
Modular exponentiation is crucial for secure data exchange in cryptography, especially for resource-constrained Internet of Things (IoT) devices. These devices often rely on third-party servers to handle computationally intensive tasks like modular exponentiation. However, existing outsourcing solutions for the RSA algorithm may have [...] Read more.
Modular exponentiation is crucial for secure data exchange in cryptography, especially for resource-constrained Internet of Things (IoT) devices. These devices often rely on third-party servers to handle computationally intensive tasks like modular exponentiation. However, existing outsourcing solutions for the RSA algorithm may have security vulnerabilities. This work identifies a critical flaw in a recent outsourcing protocol for RSA proposed by Hu et al. We demonstrate how this flaw compromises the security of the entire RSA system. Subsequently, we propose a robust solution that strengthens the RSA algorithm and mitigates the identified vulnerability. Furthermore, our solution remains resilient against existing lattice-based attacks. The proposed fix offers a more secure and efficient way for IoT devices to leverage the power of third-party servers while maintaining data integrity and confidentiality. An extensive performance evaluation confirms that our solution offers comparable efficiency while significantly enhancing security compared to existing approaches. Full article
Show Figures

Figure 1

Back to TopTop